CN110188731A - A kind of alarm method and relevant apparatus violating the regulations of operation field - Google Patents
A kind of alarm method and relevant apparatus violating the regulations of operation field Download PDFInfo
- Publication number
- CN110188731A CN110188731A CN201910491479.6A CN201910491479A CN110188731A CN 110188731 A CN110188731 A CN 110188731A CN 201910491479 A CN201910491479 A CN 201910491479A CN 110188731 A CN110188731 A CN 110188731A
- Authority
- CN
- China
- Prior art keywords
- data
- regulations
- violating
- visualized
- informative
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/20—Movements or behaviour, e.g. gesture recognition
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Emergency Management (AREA)
- Bioinformatics & Computational Biology (AREA)
- Business, Economics & Management (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Artificial Intelligence (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Psychiatry (AREA)
- Social Psychology (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
This application discloses a kind of alarm methods violating the regulations of operation field, comprising: obtains the visualized informative data of operation field;Analysis operation is determined according to the type of the visualized informative data, and the analysis is executed to the visualized informative data and is operated, behavioral data is obtained;Judge whether the behavioral data matches with act of violating regulations data;If so, carrying out alarm operation.By analyzing the visualized informative data got, behavioral data is obtained, then judged accordingly, to carry out alarm operation, reduce monitoring cost, improve the timeliness of monitoring.The application also provides the warning system violating the regulations, operation field alarm device and computer readable storage medium of a kind of operation field, has the above beneficial effect.
Description
Technical field
This application involves Real-time Monitor Technique field, in particular to the alarm method violating the regulations of a kind of operation field, operation are existing
Warning system violating the regulations, operation field alarm device and the computer readable storage medium of field.
Background technique
Currently, some for power industry etc. need in the industry that special operation scene is operated, since operation is existing
The particularity of field, needs to guarantee the safety in the operating personnel wherein to work.But operating personnel is the case where lacking supervision
Under, it is easy to appear situation off one's guard, there are habitual acts of violating regulations, cause personal injury and property loss.Therefore, existing
Technology usually increases care provider, and places Visualization Platform for carrying out remote supervisory in operation field, makees to observe
Whether industry personnel have operation behaviour violating the regulations, remind operating personnel in time, reduce the security risk of operating personnel.
But currently used method needs to put into a large amount of manpower and material resources, higher cost causes very big resource wave
Take, and remote supervisory is carried out by Visualization Platform, the security risk of operating personnel can not be controlled at the first time, reduces to work
The effectiveness of industry field surveillance.
Therefore, how the effectiveness to exercise supervision to operation field is improved in the case where reducing supervision cost, be this
The Important Problems of field technical staff concern.
Summary of the invention
The purpose of the application be to provide a kind of alarm method violating the regulations of operation field, operation field warning system violating the regulations,
Operation field alarm device and computer readable storage medium, by analyzing the visualized informative data got,
Behavioral data is obtained, then is judged accordingly, to carry out alarm operation, monitoring cost is reduced, improves the timeliness of monitoring.
In order to solve the above technical problems, the application provides a kind of alarm method violating the regulations of operation field, comprising:
Obtain the visualized informative data of operation field;
Analysis operation is determined according to the type of the visualized informative data, to described in visualized informative data execution
Analysis operation, obtains behavioral data;
Judge whether the behavioral data matches with act of violating regulations data;
If so, carrying out alarm operation.
Optionally, analysis operation is determined according to the type of the visualized informative data, to the visualized informative data
The analysis operation is executed, behavioral data is obtained, comprising:
When the type of the visualized informative data is video data, it is dynamic that human body is carried out to the visualized informative data
It performs an analysis, obtains human action information;
Using the human action information as the behavioral data.
Optionally, judge whether the behavioral data matches with act of violating regulations data, comprising:
Judge the behavioral data human action information whether the human action information phase with the act of violating regulations data
Matching.
Optionally, analysis operation is determined according to the type of the visualized informative data, to the visualized informative data
The analysis operation is executed, behavioral data is obtained, comprising:
When the type of the visualized informative data be picture data when, to the visualized informative data carry out safety away from
From analysis, range data is obtained;
Using the range data as the behavioral data.
Optionally, judge whether the behavioral data matches with act of violating regulations data, comprising:
Judge whether the range data of the behavioral data is greater than the safe distance data of the act of violating regulations data.
Optionally, further includes:
When the behavioral data and the act of violating regulations Data Matching, the behavioral data is saved to act of violating regulations number
According to library.
The application also provides a kind of warning system violating the regulations of operation field, comprising:
Visualized informative data obtains module, for obtaining the visualized informative data of operation field;
Visual information analysis module, for determining analysis operation according to the type of the visualized informative data, to institute
It states visualized informative data and executes the analysis operation, obtain behavioral data;
Judgment module violating the regulations, for judging whether the behavioral data matches with act of violating regulations data;
Alarm module violating the regulations, for carrying out alarm operation when the behavioral data and the act of violating regulations Data Matching.
Optionally, further includes:
Violation data preserving module is used for when the behavioral data and the act of violating regulations Data Matching, by the row
It saves for data to act of violating regulations database.
The application also provides a kind of operation field alarm device, comprising:
Memory, for storing computer program;
Processor realizes the step of breaking rules and regulations alarm method as described above when for executing the computer program.
The application also provides a kind of computer readable storage medium, and calculating is stored on the computer readable storage medium
Machine program realizes the step of breaking rules and regulations alarm method as described above when the computer program is executed by processor.
The alarm method violating the regulations of a kind of operation field provided herein, comprising: obtain the visualization letter of operation field
Cease data;Analysis operation is determined according to the type of the visualized informative data, to described in visualized informative data execution
Analysis operation, obtains behavioral data;Judge whether the behavioral data matches with act of violating regulations data;If so, being accused
Alert operation.
By obtaining the visualized informative data of operation field, then further according to the type of visualized informative data, to can
Analysis operation is carried out depending on changing information data, behavioral data is obtained, finally judges whether to operate against regulations according to behavioral data, when
Occur carrying out alarm operation to operation field automatically when act of violating regulations, does not need full-time staff and operation field is monitored, have
The reduction supervision cost of effect, also, act of violating regulations can be matched automatically by this method, it improves and act of violating regulations is alerted
Efficiency.
The application also provides the warning system violating the regulations of operation field a kind of, operation field alarm device and computer-readable
Storage medium has the above beneficial effect, and therefore not to repeat here.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of the alarm method violating the regulations of the first operation field provided by the embodiment of the present application;
Fig. 2 is the flow chart of the alarm method violating the regulations of second of operation field provided by the embodiment of the present application;
Fig. 3 is the flow chart of the alarm method violating the regulations of the third operation field provided by the embodiment of the present application;
Fig. 4 is a kind of structural schematic diagram of the warning system violating the regulations of operation field provided by the embodiment of the present application.
Specific embodiment
The core of the application be to provide a kind of alarm method violating the regulations of operation field, operation field warning system violating the regulations,
Operation field alarm device and computer readable storage medium, by analyzing the visualized informative data got,
Behavioral data is obtained, then is judged accordingly, to carry out alarm operation, monitoring cost is reduced, improves the timeliness of monitoring.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
In the prior art, currently used method needs to put into a large amount of manpower and material resources, and higher cost causes very big money
Source waste, and remote supervisory is carried out by Visualization Platform, the security risk of operating personnel can not be controlled at the first time, reduced
To the effectiveness of operation field supervision.
Therefore, the application provides a kind of alarm method violating the regulations of operation field, and the visualization by obtaining operation field is believed
Breath data carry out analysis operation to visualized informative data, obtain behavior number then further according to the type of visualized informative data
According to finally judging whether to operate against regulations according to behavioral data, be accused automatically to operation field when there is act of violating regulations
Alert operation, does not need full-time staff and is monitored to operation field, effectively reduces supervision cost, also, can by this method
To match automatically to act of violating regulations, the efficiency alerted to act of violating regulations is improved.
Referring to FIG. 1, Fig. 1 is the process of the alarm method violating the regulations of the first operation field provided by the embodiment of the present application
Figure.
In the present embodiment, this method may include:
S101 obtains the visualized informative data of operation field;
This step is intended to obtain the visualized informative data of operation field, and subsequent step is allowed to pass through visual information
Data carry out operation supervision except operation field, rather than are exercised supervision by special messenger to staff in operation field, subtract
The cost of labor of operation field supervision is lacked.
Further, visualized informative data can be the video monitoring data of the operation field obtained by camera,
It is also possible to the monitoring photo of operation field, can also be the infrared monitoring video data of operation field.As it can be seen that in the present embodiment
The form of the visualized informative data got is not unique, is not specifically limited herein.
S102, determines analysis operation according to the type of visualized informative data, executes analysis behaviour to visualized informative data
Make, obtains behavioral data;
On the basis of S101, this step is intended to the type difference according to visualized informative data, can determine different
Analysis operation, to execute suitable analysis operation to different types of visualized informative data.
Specifically, the distance of the stationary article in photo can be analyzed for the visualized informative data of photo type,
It can also be regarded for infrared monitoring for the behavior act of human body in the visualized informative data analysis video of video type
The distance between human body and heat source in the visualized informative data analysis video of frequency type.As it can be seen that for difference in this step
Therefore, in this step the visualized informative data of type needs to be believed according to visualization first there are different analysis modes of operation
The type for ceasing data determines analysis operation, then executes analysis operation to visualized informative data again, and then obtain corresponding
Behavioral data.
And general is to be exercised supervision by supervisor to visualized informative data in the prior art, supervisor's root
Judged according to experience, determines whether act of violating regulations occur.But since supervisor is based on experience judgement
There are certain subjectivities, and the case where not can avoid subjective errors, and therefore, the success rate supervised by personnel is extremely low.Meanwhile
There is also high costs of labor, cause the waste of related resource.
S103, judges whether behavioral data matches with act of violating regulations data;If so, executing S104;
On the basis of S102, this step be intended to behavioral data that discriminatory analysis obtains whether with act of violating regulations data phase
Match.Based on previous step, may exist different analysis data for different visualized informative datas, therefore, in this step
It needs to be determined how according to the content of analysis data and carries out judgement operation.
Further, act of violating regulations data are directed to different behavioral datas, usually there is different types of act of violating regulations number
According to, including movement violating the regulations, distance of breaking rules and regulations, laying for goods mode violating the regulations etc., to cope with different behavioral datas.
S104 executes alarm operation.
On the basis of S103, this step is intended for alarm operation.Specifically, alarm can be executed according to preset path
Operation.Wherein, preset path includes playing alert tones, flash for prompting light, to the mobile device or wearable device of staff
Alarm pushing being sent, staff being alerted with will pass through mobile device or wearable device.
Optionally, the present embodiment can also include:
When behavioral data and act of violating regulations Data Matching, behavioral data is saved to act of violating regulations database.
As it can be seen that the behavioral data after matching can also be saved into act of violating regulations database by this optinal plan, with
Continue when being judged after an action of the bowels, can also be judged according to the data in act of violating regulations database.
Further, it is also possible to deep learning is carried out to from the collected violation data of operation field, it can also be from other data
The collected violation data in library carries out deep learning, by deep learning to identification model behavioral data is judged, mention
Determination rate of accuracy of the height to act of violating regulations.
The present embodiment can be improved based on Snapshot System of Traffic Violation, be obtained by video when specifically being implemented
The visualized informative data got judges whether act of violating regulations occur.Multiple acts of violating regulations can be preset using early period in system,
Whether act of violating regulations can occur by judgment of learning automatically using the later period in system.
To sum up, the present embodiment passes through the visualized informative data for obtaining operation field, then further according to visual information number
According to type, analysis operation is carried out to visualized informative data, behavioral data is obtained, finally judges whether according to behavioral data
It now operates against regulations, alarm operation is carried out to operation field automatically when there is act of violating regulations, it is existing to operation not need full-time staff
Field is monitored, and effectively reduces supervision cost, also, can match automatically to act of violating regulations by this method, is improved
To the efficiency of act of violating regulations alarm.
Below by way of one embodiment, a kind of alarm method violating the regulations of operation field provided by the present application is done furtherly
It is bright.
Referring to FIG. 2, Fig. 2 is the process of the alarm method violating the regulations of second of operation field provided by the embodiment of the present application
Figure.
In the present embodiment, this method may include:
S201 obtains the visualized informative data of operation field;
S202 carries out human action to visualized informative data when the type of visualized informative data is video data
Analysis, obtains human action information;Using human action information as behavioral data;
As it can be seen that mainly analysis operation is executed to the visualized informative data of video data in the present embodiment, to obtain
Human action information.Wherein, human action information can be carrying movement, praise the action messages such as movement or walking motion.
Wherein, any one human action analysis side that the method for human action analysis can be provided using the prior art
Method can also be not specifically limited herein using recognition methods such as deep neural network identifications.
S203, judge behavioral data human action information whether the human action information phase with act of violating regulations data
Match;If so, executing S204;
On the basis of S202, this step is mainly that the human action information passed through in act of violating regulations data is judged,
Namely discriminatory analysis to human action information and the human action information in act of violating regulations data it is whether identical.Specifically,
There may be different differences for human action information in different operation fields in act of violating regulations data, can be according to operation
The attribute at scene determines act of violating regulations data under the scene.
S204 carries out alarm operation.
Specific implementation process about above-mentioned steps S201 to S204 can refer to the content of previous embodiment, herein no longer into
Row repeats.
Below by way of one embodiment, a kind of alarm method violating the regulations of operation field provided by the present application is done furtherly
It is bright.
Referring to FIG. 3, Fig. 3 is the process of the alarm method violating the regulations of the third operation field provided by the embodiment of the present application
Figure.
In the present embodiment, this method may include:
S301 obtains the visualized informative data of operation field;
S302 carries out safe distance to visualized informative data when the type of visualized informative data is picture data
Analysis, obtains range data;Using range data as behavioral data;
As it can be seen that S302 is mainly to carry out static safe distance to picture data to analyze, that is, compare in the present embodiment
Data in piece carry out static analysis, get in picture data human body to dangerous objects or the range data of danger zone.
Wherein, the method for carrying out safe distance analysis to picture data, can be and first identify position of human body, then identify
The position of dangerous goods or danger zone, then calculate the distance between two.Wherein, carrying out knowledge method for distinguishing can be using existing
Any one recognition methods for having technology to provide, this will not be repeated here.
S303, judges whether the range data of behavioral data is greater than the safe distance data of act of violating regulations data;If so,
Execute S303;
On the basis of S302, this step is intended to whether the range data that discriminatory analysis obtains is greater than safe distance data,
If so, indicating that situation violating the regulations occurs in position of human body at this time.Further, operating personnel can also be judged according to range data
Whether working range is exceeded.
S304 carries out alarm operation.
Specific implementation process about above-mentioned steps S301 to S304 can refer to the content of previous embodiment, herein no longer into
Row repeats.
A kind of warning system violating the regulations of operation field provided by the embodiments of the present application is introduced below, it is described below
A kind of warning system violating the regulations of operation field can correspond to each other ginseng with a kind of above-described alarm method violating the regulations of operation field
According to.
Referring to FIG. 4, Fig. 4 shows for a kind of structure of the warning system violating the regulations of operation field provided by the embodiment of the present application
It is intended to.
In the present embodiment, which may include:
Visualized informative data obtains module 100, for obtaining the visualized informative data of operation field;
Visual information analysis module 200, for determining analysis operation according to the type of visualized informative data, to visual
Change information data and execute analysis operation, obtains behavioral data;
Judgment module 300 violating the regulations, for judging whether behavioral data matches with act of violating regulations data;
Alarm module 400 violating the regulations, for carrying out alarm operation when behavioral data and act of violating regulations Data Matching.
Optionally, which can also include:
Violation data preserving module, for when behavioral data and when act of violating regulations Data Matching, by behavioral data save to
Act of violating regulations database.
The embodiment of the present application also provides a kind of field operation alarm device, comprising:
Memory, for storing computer program;
Processor, when for executing computer program the step of the realization such as alarm method violating the regulations of above embodiments.
The embodiment of the present application also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, when computer program is executed by processor the step of the realization such as alarm method violating the regulations of above embodiments.
The computer readable storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only
Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit
Store up the medium of program code.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities
The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment
Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration
?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Above to the alarm system violating the regulations of a kind of alarm method violating the regulations of operation field provided herein, operation field
System, operation field alarm device and computer readable storage medium are described in detail.Specific case used herein
The principle and implementation of this application are described, the side for the application that the above embodiments are only used to help understand
Method and its core concept.It should be pointed out that for those skilled in the art, not departing from the application principle
Under the premise of, can also to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the claim of this application
In protection scope.
Claims (10)
1. a kind of alarm method violating the regulations of operation field characterized by comprising
Obtain the visualized informative data of operation field;
Analysis operation is determined according to the type of the visualized informative data, and the analysis is executed to the visualized informative data
Operation, obtains behavioral data;
Judge whether the behavioral data matches with act of violating regulations data;
If so, carrying out alarm operation.
2. alarm method violating the regulations according to claim 1, which is characterized in that according to the type of the visualized informative data
It determines analysis operation, the analysis is executed to the visualized informative data and is operated, behavioral data is obtained, comprising:
When the type of the visualized informative data is video data, human action point is carried out to the visualized informative data
Analysis, obtains human action information;
Using the human action information as the behavioral data.
3. alarm method violating the regulations according to claim 2, which is characterized in that judge the behavioral data whether with row violating the regulations
Match for data, comprising:
Judge whether the human action information of the behavioral data matches with the human action information of the act of violating regulations data.
4. alarm method violating the regulations according to claim 1, which is characterized in that according to the type of the visualized informative data
It determines analysis operation, the analysis is executed to the visualized informative data and is operated, behavioral data is obtained, comprising:
When the type of the visualized informative data is picture data, safe distance point is carried out to the visualized informative data
Analysis, obtains range data;
Using the range data as the behavioral data.
5. alarm method violating the regulations according to claim 4, which is characterized in that judge the behavioral data whether with row violating the regulations
Match for data, comprising:
Judge whether the range data of the behavioral data is greater than the safe distance data of the act of violating regulations data.
6. alarm method violating the regulations according to claim 1, which is characterized in that further include:
When the behavioral data and the act of violating regulations Data Matching, the behavioral data is saved to act of violating regulations data
Library.
7. a kind of warning system violating the regulations of operation field characterized by comprising
Visualized informative data obtains module, for obtaining the visualized informative data of operation field;
Visual information analysis module, for according to the type of the visualized informative data determine analysis operation, to it is described can
The analysis operation is executed depending on changing information data, obtains behavioral data;
Judgment module violating the regulations, for judging whether the behavioral data matches with act of violating regulations data;
Alarm module violating the regulations, for carrying out alarm operation when the behavioral data and the act of violating regulations Data Matching.
8. alarm device violating the regulations according to claim 7, which is characterized in that further include:
Violation data preserving module is used for when the behavioral data and the act of violating regulations Data Matching, by the behavior number
According to preservation to act of violating regulations database.
9. a kind of operation field alarm device characterized by comprising
Memory, for storing computer program;
Processor realizes such as alarm method violating the regulations as claimed in any one of claims 1 to 6 when for executing the computer program
The step of.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program is realized when the computer program is executed by processor such as alarm method violating the regulations as claimed in any one of claims 1 to 6
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910491479.6A CN110188731A (en) | 2019-06-06 | 2019-06-06 | A kind of alarm method and relevant apparatus violating the regulations of operation field |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910491479.6A CN110188731A (en) | 2019-06-06 | 2019-06-06 | A kind of alarm method and relevant apparatus violating the regulations of operation field |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110188731A true CN110188731A (en) | 2019-08-30 |
Family
ID=67720754
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910491479.6A Pending CN110188731A (en) | 2019-06-06 | 2019-06-06 | A kind of alarm method and relevant apparatus violating the regulations of operation field |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110188731A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909675A (en) * | 2019-11-22 | 2020-03-24 | 广州供电局有限公司 | Method and device for identifying violation behaviors, computer equipment and storage medium |
CN111652185A (en) * | 2020-06-23 | 2020-09-11 | 广东电网有限责任公司河源供电局 | Safety construction method, system, device and storage medium based on violation behavior recognition |
CN112419665A (en) * | 2020-11-18 | 2021-02-26 | 上海电机学院 | Human near-water safety monitoring and alarming method based on target detection |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103854233A (en) * | 2014-02-27 | 2014-06-11 | 北京优孚特科技有限公司 | Electric power security control recognition device and method |
CN104092923A (en) * | 2014-07-21 | 2014-10-08 | 国家电网公司 | Intelligent Video Ranging Method for Transmission Lines |
CN104994346A (en) * | 2015-07-06 | 2015-10-21 | 重庆昊广重工机械有限公司 | Intelligent construction safety management monitoring system and image alarm processing method thereof |
CN105989682A (en) * | 2015-02-05 | 2016-10-05 | 国家电网公司 | Safety early warning and monitoring system and monitoring method for construction machinery under power transmission line |
CN106204998A (en) * | 2016-08-03 | 2016-12-07 | 湖州智讯信息科技有限公司 | A kind of industrial safety based on Intelligent hot imaging monitoring system |
CN107633210A (en) * | 2017-08-28 | 2018-01-26 | 上海欧忆能源科技有限公司 | Building site ascend a height monitoring system, method, apparatus, medium and equipment violating the regulations |
CN107658788A (en) * | 2017-11-13 | 2018-02-02 | 国网上海市电力公司 | Power circuit live-working safety is apart from real-time watch device |
CN109145789A (en) * | 2018-08-09 | 2019-01-04 | 炜呈智能电力科技(杭州)有限公司 | Power supply system safety work support method and system |
CN110119656A (en) * | 2018-02-07 | 2019-08-13 | 中国石油化工股份有限公司 | Intelligent monitor system and the scene monitoring method violating the regulations of operation field personnel violating the regulations |
-
2019
- 2019-06-06 CN CN201910491479.6A patent/CN110188731A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103854233A (en) * | 2014-02-27 | 2014-06-11 | 北京优孚特科技有限公司 | Electric power security control recognition device and method |
CN104092923A (en) * | 2014-07-21 | 2014-10-08 | 国家电网公司 | Intelligent Video Ranging Method for Transmission Lines |
CN105989682A (en) * | 2015-02-05 | 2016-10-05 | 国家电网公司 | Safety early warning and monitoring system and monitoring method for construction machinery under power transmission line |
CN104994346A (en) * | 2015-07-06 | 2015-10-21 | 重庆昊广重工机械有限公司 | Intelligent construction safety management monitoring system and image alarm processing method thereof |
CN106204998A (en) * | 2016-08-03 | 2016-12-07 | 湖州智讯信息科技有限公司 | A kind of industrial safety based on Intelligent hot imaging monitoring system |
CN107633210A (en) * | 2017-08-28 | 2018-01-26 | 上海欧忆能源科技有限公司 | Building site ascend a height monitoring system, method, apparatus, medium and equipment violating the regulations |
CN107658788A (en) * | 2017-11-13 | 2018-02-02 | 国网上海市电力公司 | Power circuit live-working safety is apart from real-time watch device |
CN110119656A (en) * | 2018-02-07 | 2019-08-13 | 中国石油化工股份有限公司 | Intelligent monitor system and the scene monitoring method violating the regulations of operation field personnel violating the regulations |
CN109145789A (en) * | 2018-08-09 | 2019-01-04 | 炜呈智能电力科技(杭州)有限公司 | Power supply system safety work support method and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909675A (en) * | 2019-11-22 | 2020-03-24 | 广州供电局有限公司 | Method and device for identifying violation behaviors, computer equipment and storage medium |
CN111652185A (en) * | 2020-06-23 | 2020-09-11 | 广东电网有限责任公司河源供电局 | Safety construction method, system, device and storage medium based on violation behavior recognition |
CN112419665A (en) * | 2020-11-18 | 2021-02-26 | 上海电机学院 | Human near-water safety monitoring and alarming method based on target detection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN211741994U (en) | Identification monitoring device for safety risk of power grid field operation | |
CN110188731A (en) | A kind of alarm method and relevant apparatus violating the regulations of operation field | |
CN111144232A (en) | Transformer substation electronic fence monitoring method based on intelligent video monitoring, storage medium and equipment | |
CN106936781B (en) | A kind of determination method and device of user's operation behavior | |
CN114003771A (en) | Special operation field abnormity early warning analysis system and method based on Internet of things | |
CN113673459B (en) | Video-based production and construction site safety inspection method, system and equipment | |
CN113627897B (en) | Method and device for controlling safety of field operators and storage medium | |
CN110379125A (en) | Cross the border recognition methods, system and relevant apparatus for a kind of danger zone | |
CN118053261B (en) | Anti-spoofing early warning method, device, equipment and medium for smart campus | |
CN114092875B (en) | Machine learning-based operation site safety supervision method and device | |
CN113205238A (en) | Situation awareness defense capacity assessment method for power plant industrial control system | |
CN112968796A (en) | Network security situation awareness method and device and computer equipment | |
CN109687999A (en) | A kind of association analysis method of alarm failure, device and equipment | |
CN105095523A (en) | Alarm event handling method and system | |
CN105825130A (en) | Information security early-warning method and device | |
CN114240013A (en) | Key information infrastructure-oriented defense command method and system | |
CN114462828A (en) | Safety early warning supervision system for engineering construction and supervision method thereof | |
CN114422327A (en) | Alarm handling suggestion generation method, device and system and computer readable storage medium | |
CN118506446A (en) | Distribution network engineering worker illegal behavior identification method, system and medium | |
CN110286609B (en) | Obstacle avoidance control method and device for intelligent safety helmet | |
CN112751927A (en) | Network safety monitoring system applied to electric power monitoring system | |
CN112906552A (en) | Inspection method and device based on computer vision and electronic equipment | |
CN116978180A (en) | Environment safety detection method and device for steel mill, medium and electronic equipment | |
CN116580514A (en) | Intelligent security method, system, medium and electronic equipment based on Internet of things | |
CN112560658B (en) | Early warning method, early warning device, electronic equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190830 |
|
RJ01 | Rejection of invention patent application after publication |